SECURITY ASSESSMENT OF UNIVERSITY DISTANCE EDUCATION
Research is devoted to information security problem of distance education university system. The functions, tasks, subjects and elements have been determined in the system of distance education. The technological process of processing information in the system of distance education is described and are marked its vulnerability. The model of threats is made and identified basic directions of the security system of distance education. The need for regular assessment of the security as a means of monitoring the effectiveness of the protection system is shown. The authors have proposed and formalized approach to the choice of rational method of distance education system security assessment. A comparative analysis of the vulnerability assessment methods showed that the development model of the university LMS security assessment is the most rational methods of quantitative and qualitative evaluation of security through the levels.
While nobody left any comments to this publication.
You can be first.
1. Babenko A.A. The use of remote sensing technologies in the preparation of information security professionals // Proceedings of the Baltic State Fishery Academy: psychological and pedagogical sciences. 2011. No 4. P. 44-52/
2. Kolgatin A.G. Information security in open education systems // Educational Technology and Society. Vol.17 2014, No1. P. 417 – 425.
3. Koshkin E.N. SWOT-analysis of distance learning in Russia // Bulletin of the International Institute of Economics and Law. 2013. №4 (13). S.28-31.
4. Method of determining the information security threats in information systems. The draft guidance document // Official site FSTEC Russia. URL: http://fstec.ru/component/attachments/download/812 (reference date 10/03/2016).
5. Positive Research Report 2016 // Analysis company Positive Technologies 2016. URL: http://www.ptsecurity.ru/upload/ptru/analytics/Positive-Research-2016-rus.pdf (9/29/2016 treatment date).
6. Report McAfee Labs threats for February 2015 [Electronic resource] // Company McAfee Labs. URL: http://www.mcafee.com/ru/resources/reports/rp-quarterly-threat-q4-2014.pdf?cid=BHP035 (reference date 10/03/2016).
7. Callegari C., Vaton S., Pagano M. A. New statistical approach to network anomaly detection .Proc. of Performance Evaluation of Computer and Telecommunication Systems (SPECTS). No. 8 (2008); P.441-447.
8. Landoll, D.J. The security risk assessment handbook (Second Edition). Boca Raton, BC: CRC Press, 2011.474 p.
9. Rahman, M., & Al-Shaer, E.A. Formal Framework for Network Security Design Synthesis. Proceedings of the 2013 IEEE 33rd International Conference on Distributed Computing Systems (2013): P. 560-570.
10. Whitman, M.E., & Mattord, H.J. Management of Information Security (Fourth Edition). Cencage Learning, 2014. 566 p.